Behavioral task
behavioral1
Sample
dd1d3dde09e39adc72d966761dd7252fa0fd27f837ea999aa3a9a4cc66508c40
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
dd1d3dde09e39adc72d966761dd7252fa0fd27f837ea999aa3a9a4cc66508c40
-
Size
120KB
-
MD5
c07f7316600126153bf3c3dce223fcd2
-
SHA1
1ea86a1ece6bd48e8973326204fc15a2dd7d35ab
-
SHA256
dd1d3dde09e39adc72d966761dd7252fa0fd27f837ea999aa3a9a4cc66508c40
-
SHA512
1a66f60abba232e650877fb4aed4bd5a40f07c88b6149c8d772406a7d0515d38bdc1be5a610e073a550a5920299a5434119fd7e890fcb4eaa6b8a3c4ed1076e6
-
SSDEEP
3072:ii6L1KoPUG7fzR5l5nHvn/Ae2ov164jmqMVcqWl2njTm:ii61lTzrLAe2AmqMVcqWl2njTm
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
dd1d3dde09e39adc72d966761dd7252fa0fd27f837ea999aa3a9a4cc66508c40.elf linux x86